Filters
Question type

Study Flashcards

Discuss the public key encryption technique.

Correct Answer

verifed

verified

This approach uses two different keys: one for encoding messages and the other for decoding them.The recipient has a private key used for decoding that is kept secret.The encoding key is public and published for everyone to use.Receivers never need to share private keys with senders,which reduces the likelihood that they fall into the hands of an intruder.One of the most trusted public key encryption methods is Rivest-Shamir-Adleman (RSA).This method is,however,computationally intensive and much slower than private key encryption.

The primary difference between a LAN and a WAN is


A) the geographical area covered by the network
B) the transmission technology used
C) the type of workstation used
D) the size of the company

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following statements is correct? TCP/IP


A) is the basic protocol that permits communication between Internet sites.
B) controls Web browsers that access the WWW.
C) is the file format used to produce Web pages.
D) is a low-level encryption scheme used to secure transmissions in HTTP format.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

A

An IP Address:


A) defines the path to a facility or file on the web.
B) is the unique address that every computer node and host attached to the Internet must have.
C) is represented by a 64-bit data packet.
D) is the address of the protocol rules and standards that governing the design of internet hardware and software.
E) none of the above is true.

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

One advantage of network technology is


A) bridges and gateways connect one workstation with another workstation
B) the network interface card permits different networks to share data
C) file servers permit software and data to be shared with other network users
D) a universal topology facilitates the transfer of data among networks

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology,the central computer manages and controls data communications among the network nodes.


A) star topology
B) bus topology
C) ring topology
D) client/server topology

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.

A) True
B) False

Correct Answer

verifed

verified

True

Cookies are files created by user computers and stored on Web servers.

A) True
B) False

Correct Answer

verifed

verified

A virtual private network:


A) is a password-controlled network for private users rather than the general public.
B) is a private network within a public network.
C) is an Internet facility that links user sites locally and around the world.
D) defines the path to a facility or file on the web.
E) none of the above is true.

F) B) and E)
G) C) and E)

Correct Answer

verifed

verified

Describe a denial of service (DoS)attack and identify three common forms.

Correct Answer

verifed

verified

A denial of service attacks (DoS)is an a...

View Answer

Describe virtualization.

Correct Answer

verifed

verified

Virtualization is the technology that ha...

View Answer

Explain a Smurf Attack.

Correct Answer

verifed

verified

A smurf attack involves three parties: t...

View Answer

A ping signal is used to initiate


A) URL masquerading
B) digital signature forging
C) Internet protocol spoofing
D) a smurf attack
E) none of the above is true

F) All of the above
G) A) and D)

Correct Answer

verifed

verified

Discuss the changing motivation behind a Denial of Service Attack

Correct Answer

verifed

verified

The motivation behind DoS attacks may or...

View Answer

In a ring topology


A) the network consists of a central computer which manages all communications between nodes
B) has a host computer connected to several levels of subordinate computers
C) all nodes are of equal status; responsibility for managing communications is distributed among the nodes
D) information processing units rarely communicate with each other

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Discuss the private key encryption technique and its shortcomings.

Correct Answer

verifed

verified

To encode a message,the sender provides ...

View Answer

HTML tags are customized to delimit attributes,the content of which can be read and processed by computer applications.

A) True
B) False

Correct Answer

verifed

verified

What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?


A) LAN
B) decentralized network
C) multidrop network
D) Intranet

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

IP spoofing


A) combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributes randomly among the targeted users.
B) is a form of masquerading to gain unauthorized access to a web server.
C) is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session.
D) is a temporary phenomenon that disrupts transaction processing.It will resolve itself when the primary computer completes processing its transaction and releases the IP address needed by other users.

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

The provision of computing power and disk space to client firms who access it from desktop PCs is known as


A) Computing-as-a-Service
B) Infrastructure-as-a-Service
C) Platform-as-a-Service
D) Software-as-a-Service

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 111

Related Exams

Show Answer